Module 6 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A _____ works well for companies that are geographically dispersed. a. hierarchical topology b. ring topology c. mesh topology d. star topology

a.

A routing table lists _____. a. nodes on a network b. packets to be sent c. the protocols that each node understands d. the IP address of a router

a.

In the bus topology, a hardware device called a _____ is used at each end of the cable to absorb the transmitted signal. a. terminator b. emulator c. stopper d. node

a.

In the context of data communication, a _____ is based on "line of sight." a. satellite b. fiber-optic cable c. twisted pair wire d. coaxial cable

a.

One way to improve the security of a Wi-Fi network is to ___________. a. enable WPA2 encryption b. filter MAC addresses on your computer c. increase the range of the wireless signal d. maintain the router's default password

a.

Transmission of data across satellites is an example of data communication through _____. a. radiated media b. uprooted media c. conducted media d. induced media

a.

What do both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on as the communication medium? a. radio frequency spectrum b. controller c. multiplexer d. CIA triangle

a.

Which problem is resolved by distributed processing? a. Lack of responsiveness in centralized processing b. Lack of security in decentralized processing c. Lack of coordination in centralized processing d. Lack of individuality in decentralized processing

a.

Which statement is true of the different forms of sender and receiver devices? a. Workstations serve as stand-alone systems. b. Netbook computers are high-cost computers with disks. c. Thin clients have processing power. d. Smart terminals are full-featured computers.

a.

_____ are used to connect computers, hubs, switches, and routers to a network in a local area network (LAN). a. Ethernet cables b. Fiber-optic cables c. Satellites d. Terrestrial microwaves

a.

_____ is the amount of data that can be transferred from one point to another in one second. a. Bandwidth b. Latency c. Packet d. Protocol

a.

A _____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well. a. local area network b. metropolitan area network c. wide area network d. controller area network

b.

Communication media that use an antenna for transmitting data through air or water are called _____. a. conducted media b. radiated media c. guided media d. wired media

b.

Horizontal scaling of a client/server architecture means _____. a. migrating the network to a faster communication media b. adding more workstations c. adding more proxy servers d. migrating the network to decentralized servers

b.

Identify a true statement about the different forms of sender and receiver devices. a. Workstations are the same as supercomputers. b. Thin clients have no processing power. c. Smart terminals are full-featured computers. d. Netbook computers do not save data to servers.

b.

Identify an advantage of centralized processing. a. It has the highest fault tolerance. b. It helps in exercising tight control over system operations and applications. c. It is highly responsive to users' needs. d. It is highly compatible with organizational growth because workstations can be added easily.

b.

In the context of data communication, managers need a clear understanding of __________. a. cache RAM b. its organizational and social effects c. how disk drives store data d. the BIOS

b.

In the context of security of wireless networks, which is true of Wired Equivalent Privacy (WEP)? a. It is the most secure system for wireless networks. b. In WEP, a key must be entered manually into the access point and the client computer. c. In WEP, keys are dynamically generated based on the user's ID and password. d. It is suitable for large networks with high bandwidths.

b.

In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots. a. time of observation b. Time Division Multiple Access c. Time Slot Allocation d. statistical time division multiplexing

b.

In the early days of computer technology, which system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers? a. Distributed processing b. Centralized processing c. Interconnected processing d. Decentralized processing

b.

WPA2 or 802.11i uses ____ to obtain a master key. a. WEP b. EAP c. MAC d. SSID

b.

Which event takes place in the most basic client/server configuration? a. The client receives and processes a query. b. The user creates a query by running client software. c. The results of a query are sent to the server. d. The server sends a request to the client over a network.

b.

Which layer of the Open Systems Interconnection (OSI) model formats message packets? a. Network b. Presentation c. Session d. Application

b.

Which statement is true of the types of client/server architectures? a. A two-tier architecture allows easy upgrades of applications. b. An n-tier architecture helps improve network performance. c. An n-tier architecture tests software easily. d. A two-tier architecture requires minor modifications in case of any changes in application logic.

b.

_____ are conducted media that can be used for both data and voice transmissions. a. Terrestrial microwaves b. Coaxial cables c. Broadcast radios d. Satellite dishes

b.

_____ is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques and helps improve the security of wireless networks. a. Service Set Identifier b. Wi-Fi Protected Access c. Media access control d. Code Division Multiple Access

b.

_____ is responsible for packet forwarding. a. Transmission Control Protocol b. Internet Protocol c. Extensible Authentication Protocol d. User Datagram Protocol

b.

Compared with a star topology, a hierarchical topology: a. has cable layouts that are easy to modify. b. is more effective at handling heavy but short bursts of traffic. c. offers a great deal of network control and lower cost. d. allows network expansion more easily.

c.

In the context of communication media, _____ media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics. a. radiated b. wireless c. conducted d. non-guided

c.

In the past, ________ networks were used to transmit voice, video, and data. a. integrated b. converged c. separate d. asynchronous

c.

Local area networks (LANs) are used to _____. a. provide communication services spanning several cities or states b. connect various wide area networks in metropolitan areas c. integrate services to a single building or campus d. link computers that are geographically far apart

c.

The _____ is a seven-layer architecture for defining how data is transmitted from computer to computer in a network. a. client/server model b. Transmission Control Protocol model c. Open Systems Interconnection model d. basic input/output model

c.

Transmission Control Protocol operates at the _____ of the Open Systems Interconnection (OSI) model. a. Physical layer b. Data Link layer c. Transport layer d. Network layer

c.

Which of the following is true of the 3G network? a. Is unable to accommodate streaming video b. Requires a nearby Wi-Fi network c. Features a wider range of services than 2G d. Has less advanced network capacity than 2G

c.

WiMAX usually has a range of about _______ for fixed stations. a. 40 miles b. 20 miles c. 30 miles d. 10 miles

c.

_____ is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps. a. Broadband b. Sideband c. Narrowband d. Baseband

c.

international postal deliveryConvergence is possible now because of a combination of technological innovation, changes in market structure, and ________. a. face-to-face meetings b. 2G networks c. regulatory reform d. international postal delivery

c.

A(n) _____ is a network connection device that can build tables that identify addresses on each network. a. hub b. switch c. adapter card d. dynamic router

d.

All client computers that try to access an access point are required to include an _____ in all their packets. a. TDMA b. CTIA c. WLAN d. SSID

d.

Data communication applications support just-in-time delivery of goods, which reduces ________. a. e-commerce efficiency b. globalization issues c. competitive edge d. inventory costs

d.

Identify a topology used by traditional mainframe networks. a. A star topology b. A ring topology c. A mesh topology d. A hierarchical topology

d.

Identify a true statement about the different forms of sender and receiver devices. a. Workstations are the same as supercomputers. b. Thin clients have no processing power. c. Smart terminals are full-featured computers. d. Netbook computers do not save data to servers.

d.

In data communication, the _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps, with maximum speed of up to 10 Gbps. a. 4G network b. IP multimedia subsystem c. 3G network d. Asynchronous Transfer Mode

d.

In the context of data communication, which is true of convergence? a. It allows the transmission of a limited amount of information in a specific period of time. b. It changes the path that data takes each time a connection is made. c. It synchronizes devices before establishing a communication link. d. It requires major network upgrades, because video requires much more bandwidth.

d.

The Wi-Fi Protected Access 2 (WPA2) uses _____ to obtain a master key, which is in turn used to negotiate for a key that will be used for a session. a. Service Set Identifier b. Wired Equivalent Privacy c. Internet Protocol d. Extensible Authentication Protocol

d.

The process of deciding which path data takes on a network is called _____. a. converging b. roaming c. diverging d. routing

d.

_____ are glass tubes surrounded by concentric layers of glass, called "cladding," to form a light path through wire cables. a. Copper line cables b. Air-spaced coaxial cables c. Twisted pair cables d. Fiber-optic cables

d.

_____ is a set of rules that governs data communication, including error detection, message length, and transmission speed. a. Attenuation b. A topology c. Throughput d. A protocol

d.

_____ is the loss of power in a signal as it travels from the sending device to the receiving device. a. Bandwidth b. Throughput c. Convergence d. Attenuation

d.

_____ is the physical link between a network and a workstation. a. An html address b. A network topology c. The session layer d. An adapter card

d.


Set pelajaran terkait

vocabulary for Duolingo english test

View Set